SlideShare ist ein Scribd-Unternehmen logo
1 von 34
TCP/IP Services and Applications
Simple Mail Transfer Protocol (SMTP)
• Specifies how mail should be delivered from one system
  to another
• Standard protocol used for transferring email from one
  computer to another
• Makes connection between sender’s server and recipient
  and then transfer messages
• For sending mails SMTP server must supply name of the
  destination host as well as name of destination mailbox
SMTP Work Flow
• A two-way transmission channel established between the sender
  SMTP and a receiver SMTP




• Commands are generated by sender SMTP and sent to receiver SMTP
Hypertext Transfer Protocol (HTTP)
• Set of rules used to exchange files on World Wide Web
• Users can exchange text, graphic images, sound, video
  and other multimedia files
• Defines how messages are formatted and transmitted
  over the Internet
HTTP Work Flow
• HTTP works on request and
  response between browser
  and server
• Web server is designated
  to handle HTTP requests
  then sends requested
  HTML page
   Data is carried in the Multipurpose Internet Mail
    Extensions (MIME) format between the request
    and response
Uniform Resource Locator (URL)
• Text string that is used to locate a file or an object on an
  internet

• URL Syntax
  <scheme>:<scheme-specific-part>
• E.g. http:// www.microsoft.com “http” is the scheme
  and “www.microsoft.com” is the scheme specific part
File Transfer Protocol (FTP) and
show configuration from CBT
• Used over Internet to exchange files
• Uses Internet's TCP/IP protocols to enable data transfer
• Establishes two way connections between computers
  one for transferring data and other for sending control
  information
FTP Communication
• Machine that are involved in an FTP transaction – Client (local
    host) machine and a server (remote host)
• Client machine initiates transfer
• Get command used to
    copy files from server to
    client
• Put command is used to
    upload files from client to server
The control connection is established when the user starts an
    FTP session
If there are many files to be transmitted the data connection can
    be opened and closed multiple times
Trivial File Transfer Protocol (TFTP) - I
• Used to transfer files to and from a remote computer
• Used by servers to boot diskless workstations, X-
  terminals and routers
• Start with a small amount of built-in software
Trivial File Transfer Protocol (TFTP) – II
• Connection and Communication between Client/Server
   – Communication and messaging different (send data byte
     by byte) in TFTP when compared with FTP
   – TFTP uses UDP (port no. 69)
   – Process of transferring a file:
      • Initial Connection
      • Data Transfer
      • Connection Termination
      Multiple TFTP exchanges are possible simultaneously by
        a server using unique port number
Network News Transfer Protocol (NNTP)
• Used to transfer Usenet news from one machine to
  another machine
• Usenet news is a large collection of discussion groups,
  covering a wide range of topics
• NNTP provides connection-oriented service
• Communication takes place between a client and a
  server that keeps netnews on both the places
Simple Network Management Protocol
                  (SNMP)

• Framework for managing devices over Internet using
  TCP/IP protocol suite
• Provides set of fundamental operation for monitoring
  and maintaining devices in the network
• Agent is server process that maintains Management
  Information Base (MIB) database for host
• Based upon client-server model
SNMP Management Components
• SNMP uses two protocols to manage tasks:
   – Structure of management Information (SMI) – defines
     rules for naming an object and defining the type of object
   – Management Information Base (MIB) – defines the
     number of objects
• Components of network management on the Internet:
   – SNMP
   – SMI
   – MIB
Security
• SNMP leads to vulnerability to a variety of security threats
  because of lack of any authentication capabilities



                           Threats




                 Modification      Message
Masquerading                                      Disclosure
                of Information    Sequence
Post Office Protocol (POP)
• Used to retrieve email from remote server to local client
  over TCP/IP connection
• E-mail clients using POP3 connect, retrieve all messages or
  store them on user's PC as new messages or delete them
  from server and disconnect
• POP3 is a TCP/IP client/server protocol
• Session States:
   – Authorization State
   – Transaction State
   – Update State
POP Session states
Internet Message Access Protocol (IMAP)

•   Enables the users to work with the mail on the server
•   Does not download the mails
•   Used to access e-mails from a local server
•   Working with mails
    – Accessing and deleting mails
    – Attachments
IMAP Advantages and Disadvantages
• Advantages:                        Disadvantages:
   – As the e-mail folders are           Complicated
     stored on the server, the
     user is able to read email          Results in higher server
     from any computer                    loads than POP3
     which belongs to the                Utilizes a lot of server
     network                              resources
   – To access more than one
     account from different
     locations, IMAP will be
     the most efficiently
Electronic Mail (E-mail)
• Provides way to communicate and send letters over the
  Internet

                           Mail
                          Delivery
                          System




      Mail          Mail            Mail          Mail
      User       Submission       Transfer      Delivery
   Agent (MUA)   Agent (MSA)     Agent (MTA)   Agent (MDA)
E-mail Architecture
• An E-mail system is divided into two sub-systems:
   – User Agents (UA)
   – Message Transfer Agent (MTA)
• E-mail architecture supports basic functions:
   –   Composition
   –   Transfer
   –   Reporting
   –   Displaying
   –   Disposition
User Agent (UA)
• Allows user to send and read e-mail
• Program that provide various methods such as command
  based, menu based or graphical to interact with the e-
  mail
• Sending Mail - User needs to provide message,
  destination address and other parameters while sending
  an e-mail
• Receiving Mail - The UA at the recipient end checks the
  mailbox periodically for new e-mail
Message Transfer Agent (MTA)
• Moves message from source to destination
• Process that run in the background and transfers the e-
  mail through system
• Message Format
   – RFC 822 – Specifies syntax for text messages within the
     framework of electronic mail
   – Two components – Envelope and Content
• MIME – Multi purpose Internet Mail Extension
• Header fields defined in MIME – Version, Content Type,
  Content-transfer-encoding, content ID and description
RFC 822 Message Formats
           Header                                                   Meaning
To:                 Primary recipient e-mail address
Cc:                 Secondary recipient e-mail address
Bcc:                Blind carbon copy e-mail address
From:               User who created the message
Sender:             Senders e-mail address
Received:           Line added by each transfer agent along the route
Return-Path:        Can be used to identify a path back to the sender


Date:               The date and time of the message sent
Reply-To:           Email address to which replies should be sent
Message-Id:         Unique number for later reference


In-reply-To:        Identification of the message to which this is a reply


References:         Over relevant message-id
Keywords:           Keywords chosen by user
Subject:            Summary of the message
E-mail Privacy
• Protection of e-mail from unauthorized access and
  inspection
• Connection to the Internet should be secured to provide
  privacy between routers and other connections between
  them
• Data encryption provides privacy by translating the
  content into different format which is unreadable
BOOTP and DHCP - I
• BOOTP – First automated configuration tool for IP hosts
   – Bootstrapping – Provides the host with the
     capability of getting IP addresses while machine
     boots
   – Requires two phases:
      • Client provided with address and other parameters
      • Client downloads softwares to function on network and
        perform tasks
BOOTP and DHCP – II
• Dynamic Host Configuration Protocol (DHCP) – Successor
  of BOOTP with different features
• Dynamically assign addresses to clients and centrally
  manage
• Consists of two major components – 1. Address
  allocation mechanism 2. Protocol that allows clients and
  server to communicate
• DHCP standard includes three different address
  allocation mechanisms:
   – Manual , Automatic and Dynamic
Difference between BOOTP and DHCP
     Bootstrap Protocol (BOOTP)                            Dynamic host configuration protocol (DHCP)


Fails if host moves from one physical network to another   Provides with temporary IP address on request, hence works
                                                                 efficiently when host moves from one physical network to
                                                                 another




Cannot provide host with temporary IP address              Provides host with temporary IP address



This type of IP address configuration is designed to       This type of configuration is used to configure IP addresses to
     configure hosts, which are diskless workstation.            computers or host that are frequently relocating from
                                                                 network to network




Supports finite or limited number of client IP address     Supports large and extensible number of client IP address
     configuration parameters                                   configuration parameters as compared to BOOTP
TELNET
• Network protocol used on internet or local area network
  connections
• Terminal emulation program for TCP/IP networks
• Enables to control server and communicate with other
  servers on network
Working of TELNET
• Telnet client – Software that acts as interface to user,
  processing user commands and presenting output from
  remote machine
• Telnet server - Program running on remote computer
  that has been set up to allow remote session
• Telnet runs over connection-oriented TCP
• TCP connection maintained for duration of Telnet
  session
• Client and server send information at same time over
  Telnet session because TCP is a full-duplex
World Wide Web (WWW) - I
• WWW is a network of Internet servers, which support
  documents that are developed using HTML
• Hyper Text Markup Language (HTML) is a language in
  which these documents are formatted
• Client-side
   – Computer application – Web browser that runs on user’s
     local computer and connects to server
   – Interpreter that interprets code in an HTML page
   – Operations carried out on client-side
World Wide Web (WWW) – II
• Server Side
   – Software program – Web server that runs on a remote
     server
   – Manages and shares web based applications
   – Operations include processing and storage of data from
     client to server
Hyper Text Markup Language (HTML)
• Markup language used to create web pages with
  hypertext and other information to be displayed on web
  browser
• A Web page consists of HTML tags which are also called
  as standalone and container tags
• Tag starts with an open angular bracket and word and
  then closing angular brackets
Java
• Programming language with number of features
• Developed by Sun Microsystems
• Applet
   – A program written in Java programming language
   – Features - Display document, send message to other
     applets, play music, display images and videos
• Servlets
   – Program that runs in response to client connection to
     server
   – Program which run on a web server and handles user
     requests and generates response
Working on WWW
• Structure of finding information over internet divided
  into three stages:
   – Finding documents
   – Formulating queries
   – Determining relevance

Weitere ähnliche Inhalte

Was ist angesagt?

TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network ppt
extraganesh
 
World wide web architecture presentation
World wide web architecture presentationWorld wide web architecture presentation
World wide web architecture presentation
ImMe Khan
 
Network management
Network managementNetwork management
Network management
Mohd Arif
 
3 Tier Architecture
3  Tier Architecture3  Tier Architecture
3 Tier Architecture
Webx
 

Was ist angesagt? (20)

03. non-functional-attributes-introduction-4-slides
03. non-functional-attributes-introduction-4-slides03. non-functional-attributes-introduction-4-slides
03. non-functional-attributes-introduction-4-slides
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network ppt
 
Layered Architecture
Layered ArchitectureLayered Architecture
Layered Architecture
 
virtual hosting and configuration
virtual hosting and configurationvirtual hosting and configuration
virtual hosting and configuration
 
Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer
 
Static dynamic and active web pages
Static dynamic and active web pagesStatic dynamic and active web pages
Static dynamic and active web pages
 
Client Server Architecture ppt
Client Server Architecture pptClient Server Architecture ppt
Client Server Architecture ppt
 
Application Layer
Application Layer Application Layer
Application Layer
 
Hypertext transfer protocol (http)
Hypertext transfer protocol (http)Hypertext transfer protocol (http)
Hypertext transfer protocol (http)
 
Http-protocol
Http-protocolHttp-protocol
Http-protocol
 
IPv4 Addressing
 IPv4 Addressing   IPv4 Addressing
IPv4 Addressing
 
DNS (Domain Name System)
DNS (Domain Name System)DNS (Domain Name System)
DNS (Domain Name System)
 
WSDL
WSDLWSDL
WSDL
 
World wide web architecture presentation
World wide web architecture presentationWorld wide web architecture presentation
World wide web architecture presentation
 
Network management
Network managementNetwork management
Network management
 
04. availability-concepts
04. availability-concepts04. availability-concepts
04. availability-concepts
 
3 Tier Architecture
3  Tier Architecture3  Tier Architecture
3 Tier Architecture
 
Inter Process Communication
Inter Process CommunicationInter Process Communication
Inter Process Communication
 
HTTP request and response
HTTP request and responseHTTP request and response
HTTP request and response
 
Xml presentation
Xml presentationXml presentation
Xml presentation
 

Andere mochten auch

Web technologies: recap on TCP-IP
Web technologies: recap on TCP-IPWeb technologies: recap on TCP-IP
Web technologies: recap on TCP-IP
Piero Fraternali
 
E mail transfer .74
E mail transfer .74E mail transfer .74
E mail transfer .74
myrajendra
 
Features of tcp (part 2) .68
Features of tcp  (part 2) .68Features of tcp  (part 2) .68
Features of tcp (part 2) .68
myrajendra
 
Transmission Control Protocol
Transmission Control ProtocolTransmission Control Protocol
Transmission Control Protocol
sangeepower
 
InternetWorking With TCP\IP
InternetWorking With TCP\IPInternetWorking With TCP\IP
InternetWorking With TCP\IP
hunghanamhus
 
User datagram protocol
User datagram protocolUser datagram protocol
User datagram protocol
Mohd Arif
 

Andere mochten auch (20)

TCP / IP Services and Standards
TCP / IP Services and StandardsTCP / IP Services and Standards
TCP / IP Services and Standards
 
Tcp and udp
Tcp and udpTcp and udp
Tcp and udp
 
UDP - User Datagram Protocol
UDP - User Datagram ProtocolUDP - User Datagram Protocol
UDP - User Datagram Protocol
 
Web technologies: recap on TCP-IP
Web technologies: recap on TCP-IPWeb technologies: recap on TCP-IP
Web technologies: recap on TCP-IP
 
Domain Name System
Domain Name SystemDomain Name System
Domain Name System
 
E mail transfer .74
E mail transfer .74E mail transfer .74
E mail transfer .74
 
Features of tcp (part 2) .68
Features of tcp  (part 2) .68Features of tcp  (part 2) .68
Features of tcp (part 2) .68
 
User datagram protocol
User datagram protocolUser datagram protocol
User datagram protocol
 
Transmission Control Protocol
Transmission Control ProtocolTransmission Control Protocol
Transmission Control Protocol
 
Reference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IPReference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IP
 
Introduction to SCTP and it's benefits over TCP and UDP
Introduction to SCTP and it's benefits over TCP and UDPIntroduction to SCTP and it's benefits over TCP and UDP
Introduction to SCTP and it's benefits over TCP and UDP
 
SCTP introduction
SCTP introductionSCTP introduction
SCTP introduction
 
Overview of SCTP (Stream Control Transmission Protocol)
Overview of SCTP (Stream Control Transmission Protocol)Overview of SCTP (Stream Control Transmission Protocol)
Overview of SCTP (Stream Control Transmission Protocol)
 
Peer to peer system
Peer to peer systemPeer to peer system
Peer to peer system
 
InternetWorking With TCP\IP
InternetWorking With TCP\IPInternetWorking With TCP\IP
InternetWorking With TCP\IP
 
User datagram protocol
User datagram protocolUser datagram protocol
User datagram protocol
 
User datagram protocol (udp)
User datagram protocol (udp)User datagram protocol (udp)
User datagram protocol (udp)
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
 
Tcp header/IP Header/Authentication header
Tcp header/IP Header/Authentication headerTcp header/IP Header/Authentication header
Tcp header/IP Header/Authentication header
 
Peer-to-Peer Systems
Peer-to-Peer SystemsPeer-to-Peer Systems
Peer-to-Peer Systems
 

Ähnlich wie Tcpip services and applications

Web essentials clients, servers and communication – the internet – basic inte...
Web essentials clients, servers and communication – the internet – basic inte...Web essentials clients, servers and communication – the internet – basic inte...
Web essentials clients, servers and communication – the internet – basic inte...
smitha273566
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
Shylesh BC
 
topicCybersecurity_4
topicCybersecurity_4topicCybersecurity_4
topicCybersecurity_4
Anne Starr
 

Ähnlich wie Tcpip services and applications (20)

Unit 3 - Protocols and Client-Server Applications - IT
Unit 3 - Protocols and Client-Server Applications - ITUnit 3 - Protocols and Client-Server Applications - IT
Unit 3 - Protocols and Client-Server Applications - IT
 
Computer networks unit v
Computer networks    unit vComputer networks    unit v
Computer networks unit v
 
Module 5 Application and presentation Layer .pptx
Module 5 Application and presentation Layer .pptxModule 5 Application and presentation Layer .pptx
Module 5 Application and presentation Layer .pptx
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
 
Computer networks
Computer networksComputer networks
Computer networks
 
IT2255 Web Essentials - Unit I Website Basics
IT2255 Web Essentials - Unit I  Website BasicsIT2255 Web Essentials - Unit I  Website Basics
IT2255 Web Essentials - Unit I Website Basics
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
Web essentials clients, servers and communication – the internet – basic inte...
Web essentials clients, servers and communication – the internet – basic inte...Web essentials clients, servers and communication – the internet – basic inte...
Web essentials clients, servers and communication – the internet – basic inte...
 
SNMP/SMTP/MIME
SNMP/SMTP/MIMESNMP/SMTP/MIME
SNMP/SMTP/MIME
 
uniti-websitebasics-230517110223-12e31dbc (1).pptx
uniti-websitebasics-230517110223-12e31dbc (1).pptxuniti-websitebasics-230517110223-12e31dbc (1).pptx
uniti-websitebasics-230517110223-12e31dbc (1).pptx
 
15 Application layer.pptx
15 Application layer.pptx15 Application layer.pptx
15 Application layer.pptx
 
Introduction to the Internet and Web.pptx
Introduction to the Internet and Web.pptxIntroduction to the Internet and Web.pptx
Introduction to the Internet and Web.pptx
 
Iso model
Iso modelIso model
Iso model
 
The Internet
The InternetThe Internet
The Internet
 
applayer.pptx
applayer.pptxapplayer.pptx
applayer.pptx
 
Cn ppt
Cn  pptCn  ppt
Cn ppt
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
Simple mail transfer protocol
Simple mail transfer protocolSimple mail transfer protocol
Simple mail transfer protocol
 
Clients and Servers.ppt
Clients and Servers.pptClients and Servers.ppt
Clients and Servers.ppt
 
topicCybersecurity_4
topicCybersecurity_4topicCybersecurity_4
topicCybersecurity_4
 

Mehr von Online

Mehr von Online (20)

Philosophy of early childhood education 3
Philosophy of early childhood education 3Philosophy of early childhood education 3
Philosophy of early childhood education 3
 
Philosophy of early childhood education 2
Philosophy of early childhood education 2Philosophy of early childhood education 2
Philosophy of early childhood education 2
 
Philosophy of early childhood education 1
Philosophy of early childhood education 1Philosophy of early childhood education 1
Philosophy of early childhood education 1
 
Philosophy of early childhood education 4
Philosophy of early childhood education 4Philosophy of early childhood education 4
Philosophy of early childhood education 4
 
Operation and expression in c++
Operation and expression in c++Operation and expression in c++
Operation and expression in c++
 
Functions
FunctionsFunctions
Functions
 
Formatted input and output
Formatted input and outputFormatted input and output
Formatted input and output
 
Control structures selection
Control structures   selectionControl structures   selection
Control structures selection
 
Control structures repetition
Control structures   repetitionControl structures   repetition
Control structures repetition
 
Introduction to problem solving in c++
Introduction to problem solving in c++Introduction to problem solving in c++
Introduction to problem solving in c++
 
Optical transmission technique
Optical transmission techniqueOptical transmission technique
Optical transmission technique
 
Multi protocol label switching (mpls)
Multi protocol label switching (mpls)Multi protocol label switching (mpls)
Multi protocol label switching (mpls)
 
Lan technologies
Lan technologiesLan technologies
Lan technologies
 
Introduction to internet technology
Introduction to internet technologyIntroduction to internet technology
Introduction to internet technology
 
Internet standard routing protocols
Internet standard routing protocolsInternet standard routing protocols
Internet standard routing protocols
 
Internet protocol
Internet protocolInternet protocol
Internet protocol
 
Application protocols
Application protocolsApplication protocols
Application protocols
 
Addressing
AddressingAddressing
Addressing
 
Transport protocols
Transport protocolsTransport protocols
Transport protocols
 
Leadership
LeadershipLeadership
Leadership
 

Kürzlich hochgeladen

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
ssuserdda66b
 

Kürzlich hochgeladen (20)

Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 

Tcpip services and applications

  • 1. TCP/IP Services and Applications
  • 2. Simple Mail Transfer Protocol (SMTP) • Specifies how mail should be delivered from one system to another • Standard protocol used for transferring email from one computer to another • Makes connection between sender’s server and recipient and then transfer messages • For sending mails SMTP server must supply name of the destination host as well as name of destination mailbox
  • 3. SMTP Work Flow • A two-way transmission channel established between the sender SMTP and a receiver SMTP • Commands are generated by sender SMTP and sent to receiver SMTP
  • 4. Hypertext Transfer Protocol (HTTP) • Set of rules used to exchange files on World Wide Web • Users can exchange text, graphic images, sound, video and other multimedia files • Defines how messages are formatted and transmitted over the Internet
  • 5. HTTP Work Flow • HTTP works on request and response between browser and server • Web server is designated to handle HTTP requests then sends requested HTML page  Data is carried in the Multipurpose Internet Mail Extensions (MIME) format between the request and response
  • 6. Uniform Resource Locator (URL) • Text string that is used to locate a file or an object on an internet • URL Syntax <scheme>:<scheme-specific-part> • E.g. http:// www.microsoft.com “http” is the scheme and “www.microsoft.com” is the scheme specific part
  • 7. File Transfer Protocol (FTP) and show configuration from CBT • Used over Internet to exchange files • Uses Internet's TCP/IP protocols to enable data transfer • Establishes two way connections between computers one for transferring data and other for sending control information
  • 8. FTP Communication • Machine that are involved in an FTP transaction – Client (local host) machine and a server (remote host) • Client machine initiates transfer • Get command used to copy files from server to client • Put command is used to upload files from client to server The control connection is established when the user starts an FTP session If there are many files to be transmitted the data connection can be opened and closed multiple times
  • 9. Trivial File Transfer Protocol (TFTP) - I • Used to transfer files to and from a remote computer • Used by servers to boot diskless workstations, X- terminals and routers • Start with a small amount of built-in software
  • 10. Trivial File Transfer Protocol (TFTP) – II • Connection and Communication between Client/Server – Communication and messaging different (send data byte by byte) in TFTP when compared with FTP – TFTP uses UDP (port no. 69) – Process of transferring a file: • Initial Connection • Data Transfer • Connection Termination Multiple TFTP exchanges are possible simultaneously by a server using unique port number
  • 11. Network News Transfer Protocol (NNTP) • Used to transfer Usenet news from one machine to another machine • Usenet news is a large collection of discussion groups, covering a wide range of topics • NNTP provides connection-oriented service • Communication takes place between a client and a server that keeps netnews on both the places
  • 12. Simple Network Management Protocol (SNMP) • Framework for managing devices over Internet using TCP/IP protocol suite • Provides set of fundamental operation for monitoring and maintaining devices in the network • Agent is server process that maintains Management Information Base (MIB) database for host • Based upon client-server model
  • 13. SNMP Management Components • SNMP uses two protocols to manage tasks: – Structure of management Information (SMI) – defines rules for naming an object and defining the type of object – Management Information Base (MIB) – defines the number of objects • Components of network management on the Internet: – SNMP – SMI – MIB
  • 14. Security • SNMP leads to vulnerability to a variety of security threats because of lack of any authentication capabilities Threats Modification Message Masquerading Disclosure of Information Sequence
  • 15. Post Office Protocol (POP) • Used to retrieve email from remote server to local client over TCP/IP connection • E-mail clients using POP3 connect, retrieve all messages or store them on user's PC as new messages or delete them from server and disconnect • POP3 is a TCP/IP client/server protocol • Session States: – Authorization State – Transaction State – Update State
  • 17. Internet Message Access Protocol (IMAP) • Enables the users to work with the mail on the server • Does not download the mails • Used to access e-mails from a local server • Working with mails – Accessing and deleting mails – Attachments
  • 18. IMAP Advantages and Disadvantages • Advantages:  Disadvantages: – As the e-mail folders are  Complicated stored on the server, the user is able to read email  Results in higher server from any computer loads than POP3 which belongs to the  Utilizes a lot of server network resources – To access more than one account from different locations, IMAP will be the most efficiently
  • 19. Electronic Mail (E-mail) • Provides way to communicate and send letters over the Internet Mail Delivery System Mail Mail Mail Mail User Submission Transfer Delivery Agent (MUA) Agent (MSA) Agent (MTA) Agent (MDA)
  • 20. E-mail Architecture • An E-mail system is divided into two sub-systems: – User Agents (UA) – Message Transfer Agent (MTA) • E-mail architecture supports basic functions: – Composition – Transfer – Reporting – Displaying – Disposition
  • 21. User Agent (UA) • Allows user to send and read e-mail • Program that provide various methods such as command based, menu based or graphical to interact with the e- mail • Sending Mail - User needs to provide message, destination address and other parameters while sending an e-mail • Receiving Mail - The UA at the recipient end checks the mailbox periodically for new e-mail
  • 22. Message Transfer Agent (MTA) • Moves message from source to destination • Process that run in the background and transfers the e- mail through system • Message Format – RFC 822 – Specifies syntax for text messages within the framework of electronic mail – Two components – Envelope and Content • MIME – Multi purpose Internet Mail Extension • Header fields defined in MIME – Version, Content Type, Content-transfer-encoding, content ID and description
  • 23. RFC 822 Message Formats Header Meaning To: Primary recipient e-mail address Cc: Secondary recipient e-mail address Bcc: Blind carbon copy e-mail address From: User who created the message Sender: Senders e-mail address Received: Line added by each transfer agent along the route Return-Path: Can be used to identify a path back to the sender Date: The date and time of the message sent Reply-To: Email address to which replies should be sent Message-Id: Unique number for later reference In-reply-To: Identification of the message to which this is a reply References: Over relevant message-id Keywords: Keywords chosen by user Subject: Summary of the message
  • 24. E-mail Privacy • Protection of e-mail from unauthorized access and inspection • Connection to the Internet should be secured to provide privacy between routers and other connections between them • Data encryption provides privacy by translating the content into different format which is unreadable
  • 25. BOOTP and DHCP - I • BOOTP – First automated configuration tool for IP hosts – Bootstrapping – Provides the host with the capability of getting IP addresses while machine boots – Requires two phases: • Client provided with address and other parameters • Client downloads softwares to function on network and perform tasks
  • 26. BOOTP and DHCP – II • Dynamic Host Configuration Protocol (DHCP) – Successor of BOOTP with different features • Dynamically assign addresses to clients and centrally manage • Consists of two major components – 1. Address allocation mechanism 2. Protocol that allows clients and server to communicate • DHCP standard includes three different address allocation mechanisms: – Manual , Automatic and Dynamic
  • 27. Difference between BOOTP and DHCP Bootstrap Protocol (BOOTP) Dynamic host configuration protocol (DHCP) Fails if host moves from one physical network to another Provides with temporary IP address on request, hence works efficiently when host moves from one physical network to another Cannot provide host with temporary IP address Provides host with temporary IP address This type of IP address configuration is designed to This type of configuration is used to configure IP addresses to configure hosts, which are diskless workstation. computers or host that are frequently relocating from network to network Supports finite or limited number of client IP address Supports large and extensible number of client IP address configuration parameters configuration parameters as compared to BOOTP
  • 28. TELNET • Network protocol used on internet or local area network connections • Terminal emulation program for TCP/IP networks • Enables to control server and communicate with other servers on network
  • 29. Working of TELNET • Telnet client – Software that acts as interface to user, processing user commands and presenting output from remote machine • Telnet server - Program running on remote computer that has been set up to allow remote session • Telnet runs over connection-oriented TCP • TCP connection maintained for duration of Telnet session • Client and server send information at same time over Telnet session because TCP is a full-duplex
  • 30. World Wide Web (WWW) - I • WWW is a network of Internet servers, which support documents that are developed using HTML • Hyper Text Markup Language (HTML) is a language in which these documents are formatted • Client-side – Computer application – Web browser that runs on user’s local computer and connects to server – Interpreter that interprets code in an HTML page – Operations carried out on client-side
  • 31. World Wide Web (WWW) – II • Server Side – Software program – Web server that runs on a remote server – Manages and shares web based applications – Operations include processing and storage of data from client to server
  • 32. Hyper Text Markup Language (HTML) • Markup language used to create web pages with hypertext and other information to be displayed on web browser • A Web page consists of HTML tags which are also called as standalone and container tags • Tag starts with an open angular bracket and word and then closing angular brackets
  • 33. Java • Programming language with number of features • Developed by Sun Microsystems • Applet – A program written in Java programming language – Features - Display document, send message to other applets, play music, display images and videos • Servlets – Program that runs in response to client connection to server – Program which run on a web server and handles user requests and generates response
  • 34. Working on WWW • Structure of finding information over internet divided into three stages: – Finding documents – Formulating queries – Determining relevance